The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as technology advances, and its use expands. As a consequence, boosting the capacity of these networks has garnered widespread attention. As a result, 5G, the next phase of cellular networks, is expected to be a game-changer, bringing with it faster data transmission rates, more capacity, improved service quality, and reduced latency. However, 5G networks continue to confront difficulties in establishing pervasive and dependable connections amongst high-speed IoT devices. Thus, to address the shortcomings in current recommendations, we present a unified architecture based on software-defined networks (SDNs) that provides 5G-enabled devices that must have complete secrecy. Through SDN, the architecture streamlines network administration while optimizing network communications. A mutual authentication protocol using elliptic curve cryptography is introduced for mutual authentication across certificate authorities and clustered heads in IoT network deployments based on IoT. Again, a dimensionality reduction intrusion detection mechanism is introduced to decrease computational cost and identify possible network breaches. However, to leverage the method’s potential, the initial module's security is reviewed. The second module is evaluated and compared to modern models.
References
[1]
Fattah, H. (2018) Internet of Things. In: Fattah, H., Ed., 5G LTE Narrowband Internet of Things (NB-IoT), CRC Press, Boca Raton, 1-6.
https://doi.org/10.1201/9780429455056-1
[2]
Lee, J., Kim, Y., Kwak, Y., Zhang, J., Papasakellariou, A., Novlan, T., Sun, C. and Li, Y. (2016) LTE-Advanced in 3GPP Rel-13/14: An Evolution toward 5G. IEEE Communications Magazine, 54, 36-42.
https://doi.org/10.1109/MCOM.2016.7432169
[3]
Dong, P., Zheng, T., Yu, S., Zhang, H. and Yan, X. (2017) Enhancing Vehicular Communication Using 5G-Enabled Smart Collaborative Networking. IEEE Wireless Communications, 24, 72-79. https://doi.org/10.1109/MWC.2017.1600375
[4]
Rastogi, E., Saxena, N., Roy, A. and Shin, D.R. (2020) Narrowband Internet of Things: A Comprehensive Study. Computer Networks, 173, Article ID: 107209.
https://doi.org/10.1016/j.comnet.2020.107209
[5]
Chaudhary, R., Aujla, G.S., Garg, S., Kumar, N. and Rodrigues, J.J.P.C. (2018) SDN-Enabled Multi-Attribute-Based Secure Communication for Smart Grid in IIoT Environment. IEEE Transactions on Industrial Informatics, 14, 2629-2640.
https://doi.org/10.1109/TII.2018.2789442
[6]
Kaur, K., Garg, S., Aujla, G.S., Kumar, N., Rodrigues, J.J. and Guizani, M. (2018) Edge Computing in the Industrial Internet of Things Environment: Software-Defined-Networks-Based Edge-Cloud Interplay. IEEE Communications Magazine, 56, 44-51. https://doi.org/10.1109/MCOM.2018.1700622
[7]
Garg, S., Kaur, K., Kumar, N. and Rodrigues, J.J. (2019) Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective. IEEE Transactions on Multimedia, 21, 566-578.
https://doi.org/10.1109/TMM.2019.2893549
[8]
Fang, L., Li, Y., Yun, X., Wen, Z., Ji, S., Meng, W., Cao, Z. and Tanveer, M. (2019) THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network. IEEE Internet of Things Journal, 7, 5745-5759.
https://doi.org/10.1109/JIOT.2019.2944301
[9]
Molina Zarca, A., Garcia-Carrillo, D., Bernal Bernabe, J., Ortiz, J., Marin-Perez, R. and Skarmeta, A. (2019) Enabling Virtual AAA Management in SDN-Based IoT Networks. Sensors, 19, Article 295. https://doi.org/10.3390/s19020295
[10]
Tayyaba, S.K., Shah, M.A., Khan, O.A. and Ahmed, A.W. (2017) Software Defined Network (SDN) Based Internet of Things (IoT) a Road Ahead. Proceedings of the International Conference on Future Networks and Distributed Systems, Cambridge, 19-20 July 2017, 1-8. https://doi.org/10.1145/3102304.3102319
[11]
Tangade, S., Manvi, S.S. and Lorenz, P. (2018) Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs. IEEE Transactions on Vehicular Technology, 67, 8647-8655. https://doi.org/10.1109/TVT.2018.2839979
[12]
Kaur, K., Garg, S., Kaddoum, G., Gagnon, F. and Ahmed, S.H. (2019) Blockchain-Based Lightweight Authentication Mechanism for Vehicular Fog Infrastructure. 2019 IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, 20-24 May 2019, 1-6.
https://doi.org/10.1109/ICCW.2019.8757184
[13]
van der Heijden, R.W., Dietzel, S., Leinmüller, T. and Kargl, F. (2018) Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems. IEEE Communications Surveys & Tutorials, 21, 779-811.
https://doi.org/10.1109/COMST.2018.2873088
[14]
Gupta, D., Garg, S., Singh, A., Batra, S., Kumar, N. and Obaidat, M.S. (2017) ProIDS: Probabilistic Data Structures Based Intrusion Detection System for Network Traffic Monitoring. GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4-8 December 2017, 1-6.
https://doi.org/10.1109/GLOCOM.2017.8254439
[15]
Sedjelmaci, H., Senouci, S.M. and Abu-Rgheff, M.A. (2014) An Efficient and Light-weight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks. IEEE Internet of Things Journal, 1, 570-577.
https://doi.org/10.1109/JIOT.2014.2366120
[16]
Wu, W., Huang, Y., Kurachi, R., Zeng, G., Xie, G., Li, R. and Li, K. (2018) Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on in-Vehicle Networks. IEEE Access, 6, 45233-45245.
https://doi.org/10.1109/ACCESS.2018.2865169
[17]
Sharma, P.K., Singh, S., Jeong, Y.S. and Park, J.H. (2017) DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks. IEEE Communications Magazine, 55, 78-85. https://doi.org/10.1109/MCOM.2017.1700041
[18]
Flauzac, O., González, C., Hachani, A. and Nolot, F. (2015) SDN Based Architecture for IoT and Improvement of the Security. 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangju, 24-27 March 2015, 688-693. https://doi.org/10.1109/WAINA.2015.110
[19]
Hu, J., Reed, M., Thomos, N., AI-Naday, M.F. and Yang, K. (2020) Securing SDN-Controlled IoT Networks through Edge Blockchain. IEEE Internet of Things Journal, 8, 2102-2115. https://doi.org/10.1109/JIOT.2020.3017354
[20]
Shafi, Q., Basit, A., Qaisar, S., Koay, A. and Welch, I. (2018) Fog-Assisted SDN Controlled Framework for Enduring Anomaly Detection in an IoT Network. IEEE Access, 6, 73713-73723. https://doi.org/10.1109/ACCESS.2018.2884293
[21]
Rathore, S., Kwon, B.W. and Park, J.H. (2019) BlockSecioTNet: Blockchain-Based Decentralized Security Architecture for IoT Network. Journal of Network and Computer Applications, 143, 167-177. https://doi.org/10.1016/j.jnca.2019.06.019
[22]
Boukria, S., Guerroumi, M. and Romdhani, I. (2019) BCFR: Blockchain-Based Controller against False Flow Rule Injection in SDN. 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, 29 June-3 July 2019, 1034-1039.
https://doi.org/10.1109/ISCC47284.2019.8969780
[23]
Yazdinejad, A., Parizi, R.M., Dehghantanha, A. and Choo, K.K.R. (2019) Blockchain-Enabled Authentication Handover with Efficient Privacy Protection in SDN-Based 5G Networks. IEEE Transactions on Network Science and Engineering, 8, 1120-1132.
[24]
Vasundhara, S. (2017) The Advantages of Elliptic Curve Cryptography for Security. Global Journal of Pure and Applied Mathematics, 13, 4995-5011.
[25]
Zheng, Z., Yang, Y., Niu, X., Dai, H.N. and Zhou, Y. (2017) Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids. IEEE Transactions on Industrial Informatics, 14, 1606-1615.
https://doi.org/10.1109/TII.2017.2785963
[26]
Garg, S., Kaur, K., Kumar, N., Batra, S. and Obaidat, M.S. (2018) Hyclass: Hybrid Classification Model for Anomaly Detection in Cloud Environment. 2018 IEEE International Conference on Communications (ICC), Kansas City, 20-24 May 2018, 1-7. https://doi.org/10.1109/ICC.2018.8422481
[27]
Kuang, L., Hao, F., Yang, L.T., Lin, M., Luo, C. and Min, G. (2014) A Tensor-Based Approach for Big Data Representation and Dimensionality Reduction. IEEE Transactions on Emerging Topics in Computing, 2, 280-291.
https://doi.org/10.1109/TETC.2014.2330516
[28]
Kaur, D., Aujla, G.S., Kumar, N., Zomaya, A.Y., Perera, C. and Ranjan, R. (2018) Tensor-Based Big Data Management Scheme for Dimensionality Reduction Problem in Smart Grid Systems: SDN perspective. IEEE Transactions on Knowledge and Data Engineering, 30, 1985-1998. https://doi.org/10.1109/TKDE.2018.2809747
[29]
Garg, S. and Batra, S. (2017) A Novel Ensembled Technique for Anomaly Detection. International Journal of Communication Systems, 30, e3248.
https://doi.org/10.1002/dac.3248
[30]
Zhang, M., Jiao, L., Ma, W., Ma, J. and Gong, M. (2016) Multi-Objective Evolutionary Fuzzy Clustering for Image Segmentation with MOEA/D. Applied Soft Computing, 48, 621-637. https://doi.org/10.1016/j.asoc.2016.07.051
[31]
Avispa, S. (2019) The Security Protocol Animator for Avispa.
[32]
Boahen, E.K., Changda, W. and Brunel Elvire, B.M. (2020) Detection of Compromised Online Social Network Account with an Enhanced Knn. Applied Artificial Intelligence, 34, 777-791. https://doi.org/10.1080/08839514.2020.1782002
[33]
Zhong, H., Wen, J., Cui, J. and Zhang, S. (2016) Efficient Conditional Privacy-Preserving and Authentication Scheme for Secure Service Provision in VANET. Tsinghua Science and Technology, 21, 620-629.
https://doi.org/10.1109/TST.2016.7787005
[34]
Boahen, E.K., Bouya-Moko, B.E. and Wang, C. (2021) Network Anomaly Detection in a Controlled Environment Based on an Enhanced PSOGSARFC. Computers & Security, 104, Article ID: 102225. https://doi.org/10.1016/j.cose.2021.102225
[35]
Kaur, K., Kumar, N., Singh, M. and Obaidat, M.S. (2016) Lightweight Authentication Protocol for RFID-Enabled Systems Based on ECC. 2016 IEEE Global Communications Conference (GLOBECOM), Washington DC, 4-8 December 2016, 1-6.
https://doi.org/10.1109/GLOCOM.2016.7841955
[36]
Sedjelmaci, H. and Senouci, S.M. (2015) An Accurate and Efficient Collaborative Intrusion Detection Framework to Secure Vehicular Networks. Computers & Electrical Engineering, 43, 33-47. https://doi.org/10.1016/j.compeleceng.2015.02.018
[37]
Kumar, N. and Chilamkurti, N. (2014) Collaborative Trust Aware Intelligent Intrusion Detection in VANETs. Computers & Electrical Engineering, 40, 1981-1996.
https://doi.org/10.1016/j.compeleceng.2014.01.009